Psych of Leaking Espionage
Psych of Leaking Espionage
a. Readers interested in gaining insights into the perceptions of serving officers on the WikiLeaks website, its sponsors and supporters, and
related matters are encouraged to read the transcript of the Director of the CIA’s presentation at the Center for Strategic and International
Studies in Washington, DC, on 13 April 2017 entitled, “A Discussion on National Security with CIA Director Mike Pompeo”; available at
https://www.csis.org/analysis/discussion-national-security-cia-director-mike-pompeo. In his opening remarks, DCIA Pompeo said intelli-
gence officers are “not at liberty to stand up to . . . false narratives and explain our mission to the American people. But fortunately, I am.”
b. This is not to say technology can only have negative effects on the vulnerable. At-risk people may find online interlocutors who alleviate
loneliness and alienation in positive ways and who offer balanced views eluding people in crisis and point them toward options other than
illegal or dangerous behavior.
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
v v v
The three essential factors pre- emotions, undermine already com- Personality
disposing individuals to espionage promised judgment, and galvanize Psychologists consistently detect
or leaking classified material—dys- impulses to seize opportunities to four personality characteristics when
functions in the personality, states of obtain escape or relief through ill- they study spies: psychopathy, nar-
crisis, and opportunity—operate sym- judged negative conduct. People in cissism, immaturity, and grandiosity
biotically. Pathological personality this state are ready targets for manip- (see page 21 of “Why Spy?” for
features not balanced by healthy traits ulation and recruitment for espionage. detailed discussion of each). Some
can result in conduct that precipitates They are also primed for behavior of these features are present in the
life crises. These in turn, stress the such as leaking, if they believe it will personalities of a great many, if not
already tenuous coping capacities bring them respite and reward. most, people who will never engage
of vulnerable personalities. Crises in wrongdoing—the reader is likely
and vulnerability together intensify
thinking of such people now. In the dents who said that trolling was their their secret enjoyment of the contrast
case of spies, however, personality favorite online activity.13 Illustrative between the day-to-day, “real life”
vulnerabilities are relatively unme- of the attitudes the researchers were humdrum in their offices, surrounded
diated by other characteristics that studying was inclusion in their Likert by unwitting, duped colleagues, and
might provide a counterbalance, as scale surveys of items such as “The their charismatic, online “spy” perso-
happens with healthy personalities. more beautiful and pure a thing is, na, uninhibited and free and complete
the more satisfying it is to corrupt,” with applauding admirers, provides
A balanced personality might and “Hurting people is exciting.”14 ample reward for engaging in espio-
have a strong preference for logical nage or leaking. There is also plenty
reasoning and the detachment to The online jargon for producing of material and people online to feed
counter the impulsivity and fanta- and enjoying the distress of others is the vengeful, spiteful characteristics
sies of immaturity; a healthy person “lulz.”a The phenomenon of cruelty that are common to both psychopathy
might have empathy for others or for sport on the Internet now has its and narcissism.
respect for hard-earned expertise that own etymology (with recognized
compensates for a tendency toward usages such as “trolling” and “lulz”). People with narcissistic personali-
the egoism and sense of entitlement Trolling is highly performative be- ty features can find ample fuel online
characteristic of narcissists. Yet an- havior: beyond seizing the attention for their grandiose fantasies and
other individual might have acquired and provoking the responses of the can experience on the Internet the
a capacity to anticipate long-term targeted persons, trolls also pursue expansive, protean sense of power
consequences or a set of acceptable psychological reward by gaining the and superiority that characterizes
rules for navigating the world that attention of admiring audiences who them, complete with clusters of fans
override psychopathic thrill-seeking share their taste for “lulz.” Keeping and/or supporters spurring them on in
and a predatory approach to exploit- bad company, online and anonymous, espionage or leaking “for the great-
ing the present moment. egged on by like-minded others look- er good” or validating their desire
ing for entertainment, can stimulate a to get revenge on organizations or
Features of the Internet and asso- vulnerable personality toward many authorities they believe insufficient-
ciated technologies have the potential harmful and destructive actions, ly appreciated them or otherwise
to undermine the counterbalancing including leaking and espionage. wronged them.
traits of even healthy personalities
and pose the risk of escalating patho- For example, a person with Immature personalities, defined
logical features. Often this occurs in psychopathic personality features by difficulties separating the fic-
anonymous encounters with facilitat- might engage in espionage or leaking tions and dreams of their imagina-
ing individuals or groups who mutu- simply for the thrill of breaking tions from hard, factual reality, find
ally reinforce and validate extreme or rules and creating chaos; like trolls, plenty of scope on the Internet for
pathological viewpoints and embold- psychopaths “do it for the lulz.” For fantasy-driven activity—including
en inappropriate behavior. them, the Web is a playground and espionage and leaking—that simply
its darker elements a confirmation bypasses any consideration of con-
Online survey studies of the of their view of reality: exciting, sequence in real life (“IRL” in Web
personality features of Internet trolls Darwinian, and pitiless—a world parlance). The immature personality
conducted by a group of Canadian populated by either predator or prey. is more easily seduced into action
scholars concluded that trolls are When people such as these spy in by the seeming unreality of behavior
“prototypical everyday sadists.”12 an Intelligence Community context, in the cyber realm, actions that can
The researchers explored the links seem to disappear with the click of a
between trolling and what psy- mouse or the swipe of a fingertip.
chologists call the “dark tetrad”
a. The online Oxford Living Dictionary de-
of personality traits—narcissism, An enduring paradox of the Inter-
fines “Lulz” (also “luls”) as “fun, laughter,
Machiavellianism, psychopathy, and or amusement, especially derived at anoth- net is that while it is distinctly real
sadism—and found that the tetrad er’s expense” and describes it as “an early (it exists in material reality), it is also
was highest among survey respon- 21st century corruption of LOL or LOLZ distinctly different—and, to some,
(“Laugh Out Loud”).
quite separate—from concrete reality. displeased, or psychologically threat- cal crises that are equally acute but
This is dangerous ground for those ened online, he or she can back out invisible to others might include
who do not readily distinguish be- and re-enter in a different persona, silently carried, lasting rage over
tween fact and fiction, between what not something that is possible—at perceived slights or injustices, an
resides in their imaginations, their least not to the same degree—IRL. overwhelming desire for revenge, or
desires and hopes, and what resides A user can also set aside, discard, or other deep-seated feelings or beliefs
in concrete, material reality or IRL. destroy poorly functioning or frus- that compel the vulnerable person to
In contrast, well-grounded people trating devices, again, something dif- action.
can find cyberspace exciting, even ficult to do with people. Furthermore,
enchanting, and useful to sustaining both the Internet and the associated Intelligence services have long ex-
a complex, full life—while remain- devices of entry into it appear to have ploited crisis states to recruit agents.
ing solidly anchored in the material “lives” of their own (they continue to As described in the 2003 article, un-
world and retaining good judgment act autonomously and separately scrupulous services may deliberately
about the consequences of actions from logged-off users), but the user create crises in the lives of targets to
taken in either realm. has an illusion of control because he improve recruitment prospects, for
or she can turn the devices on or off, example through escalating gambling
Psychopathy, narcissism, and thus suspending their digital lives debts or entangling the target in a
immaturity all have in common the until the user chooses to re-engage on risky sexual or romantic relationship
characteristic of grandiosity. A well- his or her own terms. Such seeming with a partner controlled by the ser-
known adage of the digital age is: sovereignty over something as global vice. Such intelligence services may
“On the Internet, everyone knows and powerful as the Internet, the also find ways to precipitate similar
you are a dog.”a, 15 It could also be people one encounters there, and the crises in the lives of family members
said that: “On the Internet everyone “thinking and behaving” machines or other loved ones in order to con-
thinks you are a hero, or a villain.” that mediate relationships can feed trol the prospective spy by offering
Our technology now makes it possi- grandiosity, at least if the tendency espionage as a solution to the loved
ble for a person to develop and ex- toward grandiosity is uncoupled from one’s predicament. (See “Why Spy?”
press multiple selves in cyberspace.16 the leveling and grounding of “real “Exploitation of the Vulnerable” on
This is a context of human interaction life.” page 34.)
and action that can feed and reward
grandiose self-perceptions.17 As we have seen, the cyber realm
A Precipitating Crisis is a hazardous environment for those
Furthermore, the Internet, and in crisis or easily led to crisis. Those
the technology and devices that give The second necessary element with a propensity for problematic or
access to it, are ostensibly under the that paves the way for spying is the pathological behavior—for example,
control of the anonymous user. If the emergence of a personal crisis of uncontrollable gambling, computer
anonymous user feels unrewarded, such intense weight and urgency gaming, spending, or sexual behav-
that the vulnerable person experi- ior—will find on the Internet remark-
ences a sense of immediate threat, ably easy ways to reach outlets for
loses perspective and judgment, and their addictions or compulsions. In
a. This is an evolution of the now-classic
adage “On the Internet, nobody knows
becomes fixated on finding a way to cases such as these, the name “World
you’re a dog,” the caption of a 1993 New put an end to the situation. The state Wide Web” is apt: psychologically
Yorker cartoon by Peter Steiner featuring of crisis may or may not be visible to vulnerable people, like insects in a
two dogs, one sitting on a chair working on friends, family, and associates. (See spider’s web, do get snared online. In
a computer, making the above observation “Why Spy?” “Precipitating Crises” addition, while they may believe they
to the other dog, seated on the floor. The on page 31.) Sources of psycho-
cartoon quickly became iconic and signaled have found relatively safe outlets
the moment when global culture recog-
logical pressure obvious to observers for their pathological or hazardous
nized the pervasive problems of identity on might include a looming bankruptcy, behavior, they are subjecting them-
the Internet, where a user can never fully imminent dismissal from work, or selves to the possibility they will
trust or know the true natures of unseen a divorce. Sources of psychologi- be tracked and risk suffering crises
interlocutors.
of embarrassment or becoming the For others seeking justification, escalating order of gravity, a long list
subjects of the attention of those online material assists in rationalizing of illegal goods and services acces-
eager to find and exploit vulnerable or trivializing acts such as espio- sible to paying anonymous custom-
persons. Finally, the more a person’s nage or leaking of national security ers, ranging from pirated content
online life becomes the center of his information. This nullifying effect to drugs, to legal documents (pass-
or her consciousness and motivation, of the Internet, where qualms about ports, citizenship papers, transcripts,
the more real-life, stabilizing com- espionage and leaking are neutralized professional licenses), trafficking in
mitments—to self-care, to others, by comparisons to a glut of “worse” organs and humans, and murder-for-
to community—will weaken and behavior—is often underestimated. hire. He ended the list by describing
attenuate. Work, relationships, health, FBI Special Agent Robert Hanssen a site that offered the opportunity to
financial status, and lifestyles suffer made this argument when he stated witness through live streaming the
for people who have arrived at this to an interviewer who was sharply worst acts of child abuse—while
point, causing the kinds of tangible, challenging him to recognize the interacting with other paying anony-
IRL crises that might bring a per- consequences of his espionage, “In mous customers and the perpetrators.
son with access to national security the whole march of history, a little Goodman called this the very center
information to the attention of hostile espionage doesn’t amount to a hill of hell, and concluded that “the In-
intelligence services, and from there of beans.” (See “Why Spy?” “Rob- ternet provides a delivery system for
lead them into espionage. ert Hanssen: Self-Designated Cold pathological states of mind.”
Warrior” on page 30 for a review
More subtly, in a context in which of the case.) Today’s spies need not The Dark Web is also an educa-
seemingly complete anonymity turn to human history to find ways to tion in nihilism. A prospective spy
enables the expression of all desires, minimize their behavior; they need can find there sufficient reason to dis-
no matter how deviant, dangerous, only visit the Dark Web in the present card doubts and move forward into
or harmful to others, no brakes on moment and see what transpires espionage or leaking. After such ex-
behavior exist other than those a per- there.a posure, for those with compromised
son already possesses when entering moral compasses, espionage seems
cyberspace. For the group of people In his book on Internet crime, trivial and leaking seems a lark.
we are discussing—people with per- former FBI futurist-in-residence, People with strong inherent moral
sonality pathologies, in crisis—these Interpol advisor, and police officer compasses and an uncompromised
brakes are often already weak and Marc Goodman devoted a section capacity to stay grounded in con-
likely to grow weaker. to the Dark Web entitled “Into the crete reality understand that behavior
Abyss.”18 He used the metaphor of online has consequences in real life,
For those with moral qualms, Dante’s circles of hell to provide, in such as the real plight of child and
Internet content can provide justifica- adult victims in Internet-mediated
tion for behavior that leads to crises crimes.
and to subsequent illegal choices. a. The Dark Web forms a small part of the
That justification can come from Deep Web, which is the part of the Web
not indexed by search engines. Because of
online dialogue with kindred spirits Ease of Opportunity
free software, anonymity in the Dark Web
or with more focused interlocutors is at present almost unbreakable, enabling The third necessary element in
such as intelligence service officers, hackers, terrorists, gangsters of every sort, spying is connecting with a customer,
e.g., agent recruiters, pursuing their pedophiles, and other criminals to transact
their business there in safety, unless they
patron, or platform interested in the
own goals through manipulating a
become subject to their own “insider threat” information on offer. It is in this third
person’s crisis. Platforms seeking
(undercover police informants, for exam- element that the greatest changes
leakers may also manipulate a vul-
ple). More positively, the Dark Web also have occurred since the publication
nerable person who is experiencing provides a venue in which political dissi- of “Why Spy?” (See “Elements of
what he or she perceives as a crisis of dents and others with positive or non-crim- Espionage” on page 20.) Those
conscience. inal intent are able to communicate and
collaborate in relative safety. (See Kristin
currently seeking to connect with
Finklea, Dark Web, Congressional Research customers or platforms for either
Service Report R44101, 10 March 2017.) espionage or leaking now have many
v v v
those who struggle with relationships to the mission and experiences of ings and gatherings. This occasion-
IRL, and may be alienated from other professional intelligence officers. ally inconvenient (sometimes very
aspects of real life, or those who find inconvenient) but necessary secu-
themselves temporarily alone and at Volunteer employee groups rity requirement may disappear at
loose ends. should be actively supported, provid- some point but at present we should
ed senior sponsors, and validated by celebrate our simple, yet profound,
In the face of the risks exacerbat- the attention of senior leaders, and difference from the rest of the work-
ed or caused by loneliness and alien- these groups should be encouraged to ing world: we converse with each
ation, frequent organizationally spon- reach out to colleagues who seem to other, rather than with our screens, in
sored events in workplaces—with need help in connecting with commu- the “open” moments before and after
people in physical attendance, not nity. In the digital era, such elements meetings, in the cafeteria, and in our
virtually present—have never been of community life in intelligence hallways. We have opportunities to
more critical to counterintelligence. agencies have moved from being break away from the “holding pow-
When vulnerable employees are em- “nice to have” morale-builders to er” of our devices and are therefore
bedded in communities in which they critical features of security and coun- able to enjoy the best of both the
feel they belong and are accepted, the terintelligence risk mitigation. digital world and the concrete, IRL,
risk of their acting on their vulnera- material world.
bilities in times of personal crisis is The Intelligence Community can
mitigated. They will be less prone also fight digital fire with fire by
to seek connections and relief in the encouraging its online, secure, clas- A Caution: The Phenome-
dangerous domains of the Internet or sified “village commons” to flourish
nology of Surveillancea
susceptible to relationships offered and grow, including supporting those
commons as venues for expressions Big data, allied with machine
by those seeking to manipulate and
of creativity, opinion, critique, and learning and cognitive computing,
exploit them.
even dissent. We can count on the has ushered in an amazing pano-
Examples of significant tradi- lack of anonymity in these online ply of digital surveillance methods
tions and community-building at government-sponsored venues to purporting to evaluate, profile, and
CIA include annual events such as avert the ills that plague the open predict the behavior of people,
Family Day and Combined Federal Internet: trolling, harassment, bully- based on the record of their activ-
Campaign (CFC) fundraising events ing, hacking, and the like. At present ities online.22 New technological
before the winter holidays, during our secure, classified online venues tools collect and exploit the trail of
which offices and teams develop cre- parallel the best of Internet values information—sometimes labeled
ative methods, including book sales and provide a precious insider-threat “digital exhaust”—that all people
and auctions, to raise funds—one risk-mitigating resource that must be leave in IT systems as they go about
particularly memorable fundraiser protected despite potential disclosure their normal activities at work and
was the auctioning of a gingerbread risks.21 Efforts to manage the risks in their personal lives. Big data and
replica of the model of Usama Bin that come from permitting open, computing power together allow an
Ladin’s compound used in planning online discourse should be devised in individual’s present behavior to be
the SEAL operation against him in ways that protect the current vibrancy evaluated against his or her personal
2011. Also important is the commem- of this classified cyber community, baseline of past behavior; changes
oration of those lost in service held because the vitality and the bonds and anomalies—for good or ill—can
at CIA’s Memorial Wall each May. created there will spill over into the be flagged and analyzed. Proponents
Presentations by outside speakers in Intelligence Community.
the Headquarters auditorium that are
One of the hidden benefits of the a. Phenomenology is a specialized branch
open to all employees and attended of philosophy and psychology that studies
and moderated by senior leaders have prohibition of most portable personal
subjective experience. Here I address how
also become highly popular opportu- devices in Intelligence Community people subjectively experience surveillance
nities for the workforce to gather and buildings is connection; people are when they are aware of being subject to it
consider issues and ideas important not locked into their screens in meet- and how people subjectively experience the
process of surveilling others.
of such methods assert that they can heated cultural debate surrounding mines loyalty to the organization.
be used to expose in intimate detail surveillance and privacy issues can Furthermore, blanket surveillance
the psyche driving behavior, includ- be framed in many ways: political, methods risk flattening a culture into
ing assessing and predicting the legal, philosophical/ethical, and insti- blandness and dulling its creative
current and potential risks individuals tutional risk management, as well as edge. (See the “Appendix: Consider-
present to systems, to others, and to in terms of individual personality dif- ations on the State of Surveillance in
themselves. ferences in support of and tolerance Democratic Societies,” beginning on
for surveillance.25 For the purposes of page 11.)
For example, some elements of this article, I focus on research that
spoken and written language unrelat- sheds light on how people experience Finally, it is important to be wary
ed to the content or meaning being surveillance psychologically and of the long-term, eroding effects
communicated—behaviors such as the potential consequences of those of blanket, intrusive, or shadowy
a person’s habitual choice of words, experiences on individual psyches surveillance on the composition of
repeated use of certain grammatical and therefore on their attitudes and teams or across an organization’s
structures, tempo, and syntax—can behavior. workforce. Social and behavioral
shed light on a person’s identity, science research has demonstrated
background (regional and education- What the research shows is that that there are individual differences
al), state of mind, and emotions at people dislike being surveilled.26 in attitudes toward and tolerance of
the moment of communication. The Most, however, will tolerate some workplace surveillance. Technol-ogy-
“sentiments” expressed by oth- level of intrusion, if they believe driven assessment and surveil-lance
ers—such as colleagues, neighbors, it is necessary for institutional and tools pervading a workplace are
friends, and even family members— social safety and to maintain order.27 likely to repel highly autonomous,
about a particular person can be The surveillance, however, must be creative, questioning people who
collected and assessed using the same experienced as fair and transparent; then self-select themselves out of the
methods corporations use to track the consensus from studies in man- team or organization, leaving be-
public sentiments surrounding their agement science in this area is that hind a concentrated group of people
brands.23 honest communication with employ- whose temperaments tend toward
ees—and citizens—about the specific caution, order, and safety, and who
Currently employers, private nature of and need for surveillance are comfortable with established
corporations, politicians, and gov- is critical to gaining acceptance and systems for security and institutional
ernments are applying these and compliance. Being able to judge for control. Over time, the “diversity of
other data analysis tools to assess, themselves if the level of surveillance mind and temperament” necessary
influence, and monitor persons and is reasonable and knowing with some for an intellectually fresh, creative
groups. The promise of such tech- specificity about the methods used re- organization is damaged by systemat-
niques to assist security and counter- turns some of the personal autonomy ic loss of certain types of productive,
intelligence insider-threat programs that surveillance inevitably removes psychologically healthy people, irre-
is self-evident, but there are risks and recalibrates the relationship of spective of which type they happen
that must be taken into account in trust and fair-dealing between the to be.
using them and costs to be tallied and surveillors and the surveilled.
weighed against promised benefits.
(See Textbox 3, which addresses this Government reports have reached Active Support for CI
point, on the following page.) the same conclusions. An atmosphere and Security Officers
of constant observation that is per-
There exists a robust body of In this dawning digital age, those
ceived to be aimed at control rather
empirical research in the social and responsible for protecting employees
than stopping wrongdoing breeds
behavioral sciences tallying the and information in the Intelligence
resentment and a tendency toward
potential negative effects on people Community have extraordinarily dif-
hidden protest; such surveillance at
and organizations of pervasive sur- ficult jobs. Pre-Internet and pre-digi-
work undermines morale and produc-
veillance.24 The current complex and tal methods still apply somewhat, but
tivity, increases stress, and under-
new technology-driven risks prolifer-
The discussion within democrat- ogy-driven surveillance process as White House Review Group, 2013
ic societies about the abundance of follows: Similarly, a 2013 report to the
data, computing power, privacy and White House from the President’s
security (some frame this as a polit- Effective monitoring tools . . . Review Group on Intelligence and
ical conflict between civil rights and take advantage of technology to Communications Technologies rec-
government surveillance) is ongoing. surpass standard [personnel] ommended the following:
Below are some highlights for con- screening. . . . In particular,
sideration. advanced text analytics and All personnel with access to
psycholinguistic tools that track classified information should be
George Orwell, 1984 an employee’s communications included in a Personnel Con-
Orwell’s classic 1949 novel has across social media and other tinuous Monitoring Program
enjoyed a resurgence in popularity platforms to detect life stressors (PCMP). The PCMP would
because of renewed focus on privacy and analyze sentiment can help access both internally available
issues and fear of totalitarian govern- detect potential issues early. . . . and commercially available in-
ment control enabled by technology.29 Another critical element is formation, such as credit scores,
The novel explores the psychology improving the sharing of infor- court judgments, traffic viola-
of surveillance from the perspective mation within the organizations tions, and other arrests. (239)
of the surveilled. Orwell counted on among managers, human re-
his readers’ intuitive understanding sources, information technology The authors added:
of the motives of a protagonist who (IT), security, and legal advisers
We recognize that such a pro-
would risk everything to secure a bit regarding minor counterproduc-
gram could be seen by some as
of privacy in a world characterized tive work behaviors that may
an infringement of the privacy
by “Big Brother’s” oversight of every indicate an employee struggling
of federal employees and con-
aspect of life. The novel’s enduring and at heightened risks of com-
tractors. . . . But, employment in
power results from the readers’ empa- mitting a malicious act.
government jobs with access to
thy for the fictional Winston Smith’s
The INSA document notes that special intelligence or special
effort to resist, and his ultimate fail-
this “continuous monitoring” ap- classified programs is not a
ure to attain even a small measure of
proach to mitigating insider threat right . . . we believe that those
autonomy, making it one of the great
might have implications for “work- with the greatest amount of ac-
tragic novels in the Western canon.
place morale,” “civil liberties,” and cess to sensitive programs and
INSA, 2017 concludes that each organization information should be subject
In April 2017 the Intelligence and must arrive at its own culture-driven to Additional Monitoring . . .
National Security Alliance (INSA) decisions about the optimal balance (240–41)31
published a list of state-of-the-art sur- of privacy and security in the organi-
The House of Lords, 2009
veillance tools available to organiza- zation:
In February 2009, the British
tions interested in mitigating insider
In the end, this is a critical risk Parliament received a document from
risks, particularly in the national
management exercise for senior a House of Lords committee titled
security context.30 The document
leaders in all organizations as Surveillance: Citizens and State.32
suggested mitigating insider threat
the destructive power of ma- It reported the results of a general
through “leveraging innovative tech-
licious insiders grows and the review of methods and practices and
nology and data sources to monitor
tools to monitor and mitigate included recommendations for future
and evaluate individuals on a contin-
become more sophisticated and actions. It also described concerns
uous basis” and noted that the listed
intrusive. that ubiquitous surveillance is chang-
computer-based tools could assist in
ing the relationship between citizen
“swift, continuous identification and
and state.
assessment.” It defined the technol-
The report quoted a professor Several years ago London was surveillance, can cause by eroding
of sociology and deputy director of suffering from a nail bombing bonds of trust within society, par-
Criminological Research at the Uni- campaign by an individual ticularly between those who control
versity of Sheffield: . . . targeting specific parts of the surveillance and those being
London with his nail bombs surveilled. He asks, hypothetically, if
Mass surveillance promotes and there were extremist groups you would you rather attend Scrutiny
the view . . . that everybody is claiming responsibility for the College, where examination rooms
untrustworthy. If we are gather- actions. That event was entirely are equipped with several cameras
ing data on people all the time supported by CCTV evidence in and jammers prevent the use of pri-
on the basis that they may do terms of actually detecting the vate devices for cheating, or Probity
something wrong, this is pro- crime. What value do you put on College, where students are trusted to
moting a view that as citizens the price of that detection?(21) abide by an ethics code. The philoso-
we cannot be trusted. (27) pher argues that blanket surveillance
Emrys Westacott, 2010 aimed at control undermines the ideal
The report also described the Philosopher Emrys Westacott that persons in society will behave
distinct social gains—tangible and begins a 2010 article in Philosophy responsibly because they want to, out
perceived—of broad surveillance Now by asking if Adam and Eve of love and respect for themselves
programs, particularly in countering would have eaten the forbidden apple and others. He concludes that too
terrorism and crime, and it summa- had God installed CCTV cameras in much monitoring destroys the free
rized empirical data suggesting that Eden.33 A more serious discussion bonds between people in societies; it
most citizens support the counterter- follows this amusing opening in weakens the internal moral compass-
rorism and crime-fighting functions which Westacott explores the distinct es of both the people and their soci-
of surveillance. The report quoted pragmatic social benefits that derive ety. He also concludes, however, that
a senior constable and chair of The from some forms of surveillance not enough surveillance of people’s
Association of Chief Police Offi- (for example, from traffic cameras) behavior results in a lawless state, as
cers CCTV Working Group, who and also the harms that too much we have seen on the Dark Web.
said: surveillance, or certain forms of
v v v
tion that the true identity of Robert Galbraith was in fact J. K. Rowling. Whilst accepting his own culpability, the disclosure was
made in confidence to someone he trusted implicitly.” (See Jon Stock, “J.K. Rowling unmasked: the lawyer, the wife, her tweet
—and a furious author, ” The Telegraph, 21 July 2013. Also at www.telegraph.co.uk/culture/books/10192275.)
7. The Heroic vs. Self-serving Spy: This article focuses on self-serving spies or those who have been manipulated or coerced.
There is another type of person who commits espionage: the genuinely heroic spy. A critical element of a professional intelli-
gence officer’s expertise is the ability to accurately assess the true, underlying conscious or unconscious motives of sources.
The evaluators begin by first registering, then looking beyond, the self-images of sources and testing the stated motives against
the tangible and emotional benefits actually accruing to them. An officer’s true assessment can be quite different from what the
officer purveys to a source during handling interactions. Professional officers are trained to use observation, critical thinking,
vetting techniques, comparisons with what is known from studies of past cases of espionage, and above all expert judgment to
distinguish between sources who are genuinely heroic, and those who are not. Officers also submit their assessments to the scru-
tiny of their peers, particularly counterintelligence officers who independently evaluate sources and ensure that what is on record
about a source’s motives for espionage is unbiased and accurate and handling methods are appropriately matched to the source’s
true motives. While self-serving, manipulated, or coerced spies are the subject of this article, it is important to remember that
heroic ones do exist and that their personalities, the crises that led them to spy, and the handling tradecraft appropriate for them
are different from those of other types. There is also a distinction—psychological as well as legal—between whistleblowers,
who use legal channels to address their ethical or other workplace concerns, and leakers, who bypass legal, authorized channels
of redress. Readers who wish to explore the distinctions may be interested in the recently published, newspaper opinion piece
written by a Washington, DC, lawyer who handles classified matters and represents whistleblowers in the national security field:
Mark S. Zaid, “Reality Winner Isn’t a Whistleblower—Or a Victim of Trump’s War on Leaks,” Washington Post, 8 June 2017.
See also on this subject, US Department of Labor Occupational Safety and Health Administration, The Whistleblower Protection
Programs, at https://www.whistleblowers.gov.
8. David E. Pozen, “The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information,”
Harv. L. Rev. 127, No. 2 (20 December 2013).
9. Rahul Sagar, “Creaky Leviathan: A Comment on David Pozen’s Leaky Leviathan,” Harv. L. Rev. 127, No. 2 (20 December
2013).
10. William J. Burns and Jared Cohen, “The Rules of the Brave New Cyberworld,” Foreign Policy.com (16 February 2017).
11. Disclosures in the Private Sector: The ethical, legal, and media dynamics surrounding the leaking of classified government in-
formation also apply to disclosures of private-sector sensitive or proprietary corporate information. These issues were the central
themes, for example, of the film “The Insider,” which was based on the true story of a former tobacco industry senior executive
and scientist who worked with a reporter to disclose his former employer’s effort to suppress information demonstrating that the
company was aware of and manipulated the addictive components of cigarettes. The story was originally carried in Vanity Fair.
(Marie Brenner, “Whistleblower: The Man Who Knew Too Much,” May 1996). The article and movie also touched on questions
about the scientist’s mental stability, motives, and veracity.
12. Trolls and Trolling: The exact definitions of Internet “trolling” or “trolls” are evolving in tandem with changes in technology.
Roughly speaking, there are two broad categories of trolls. Some primarily troll instrumentally and some primarily for fun or
“for the lulz”—a variant of LOL, “laugh out loud,” in Internet jargon. They differ psychologically in important ways. Those
who engage in online manipulation, attack, and sabotage chiefly in pursuit of some other goal, most often financial profit (for
example, those who are paid to disrupt commercial websites), may find only limited pleasure in the trolling itself. Their sense
of reward (what psychologists call “emotional benefits”) comes from achieving the primary goal, such as getting paid. The
pleasure-seeking trolls do so for the inherent emotional reward (the “lulz”) they generate in the behavior itself. The difference
between the instrumental type and the lulz-seeking type is akin to the difference between a professional hit man, for whom
killing is an emotionally neutral “professional” act that leads to a secondary reward, and a killer whose gratification resides in
the act of killing itself, such as, for example, the sense of god-like power it brings or sadistic pleasure in the suffering of victims.
Engaging in destruction for personal gain or for pleasure—an age-old practice among human beings—like so much else in real
life has found new expression in cyberspace.
13. Readings on Trolls: E. E. Buckels, Paul D. Tranpnell, and Delroy L. Paulhus, “Trolls just want to have fun.” Personality and
Individual Differences 67 (2014):97–102. See also: N. Craker and E. March, “The Dark Side of Facebook: The Dark Tetrad,
negative social potency, and trolling behaviors,” Personality and Individual Differences 102 (2016): 79–84. For an early study of
the decreased self-monitoring, decreased self-evaluation, and the disinhibiting and de-individuation effects of anonymity online,
see: Sara Kiesler, Jane Siegel, Timothy.W. McGuire, “Social psychological aspects of computer-mediated communication,”
American Psychologist 39, No. 10 (October, 1984): 1123–34. For a somewhat different take on trolling that examines how it
may not be wholly deviant behavior because it corresponds to and fits comfortably within the contemporary media landscape,
readers are directed to Whitney Phillips,“Internet Troll Sub-Culture’s Savage Spoofing of Mainstream Media,” Scientific Amer-
ican, 15 May 2015. The article is excerpted from a book by the same author, This Is Why We Can’t Have Nice Things: Mapping
the Relationship between Online Trolling and Mainstream Culture (MIT Press, 2015).
14. This specific survey item from the research cited immediately above was reported by Chris Mooney in Slate, on 14 February
2014, in an article titled: “Internet Trolls Really Are Horrible People: Narcissistic, Machiavellian, psychopathic, and sadistic.”
See http://www.slate.com/articles/health_and_science/climate_desk/2014/02/internet_troll_personality_study_machiavellian-
ism_narcissism_psychopathy.html.
15. Dogs on the Internet: In 2017, the New York Daily News published a cartoon by Bill Bramhall that played off of the 1993 New
Yorker cartoon and resulting canine-at-a-keyboard meme. The new cartoon captured current alarms about surveillance, dimin-
ished or impossible online privacy, and the use of data analytics by private corporations and public agencies to profile, track, and
target users who wish to remain incognito when they surf, work, or shop online. Bramhall’s cartoon features a solitary dog at his
computer confronting a full-screen pop-up advertisement showing a can of dogfood with the caption “You might like ALPO.” A
word bubble shows the dog thinking: “Whatever happened to ‘On the Internet nobody knows you are a dog’?”
16. Turkle, The Inner History of Devices and Identity on the Web.
17. Internet Aliases: Anonymous online aliases, rhetoric and slogans often hint at the slyness of psychopathy, the egotism of nar-
cissism, and the fantasies of immaturity. For example, some famous hacker handles are Scorpion, SOLO (which gestures to the
allure of being a lone operator and also to the Star Wars character), MafiaBoy, Gigabyte, cOmrade, “why the lucky stiff” (some-
times abbreviated “_why”), Dread Pirate Roberts, Poison League, Commander X. According to the global computer magazine
PCWorld, the British hacker SOLO left a message on a compromised machine that read: “US foreign policy is akin to Govern-
ment-sponsored terrorism these days . . . I am SOLO. I will continue to disrupt at the highest levels.” (http://www.pcworld.com/
article/2989146/security/infamy-and-alias-11-famous-hackers-and-their-online-handles.html#slide1). A famous online motto is
this clever but also barbed inversion, from the hacking group Anonymous, of biblical stories of demonic possession and New
Testament values: “We are Anonymous. We are legion. We do not forgive. We do not forget. Expect us.”
18. The Onion Router: Tor (“The Onion Router”) is the most popular gateway into the Dark Web. It is free software, enabling
anonymous communication through encryption and multiple peer-to-peer Internet relay channels designed to hide users’ IP
addresses from those interested in tracking them. The result is an untraceable, secure platform that conceals users’ location and
usage. The concept of “onion routing” (the underlying metaphor is that pursuing an anonymous user through multiple relays
is like peeling an onion, never arriving at the core) was developed in the mid-1990s by a mathematician allied with computer
scientists at the US Naval Research Laboratory in order to protect US intelligence online communications.
19. Leak Bait: Sue Halpern, in her review of Risk, a documentary portrait of Julian Assange (“The Nihilism of Julian Assange,”
The New York Review of Books, 13 July 2017: 15), writes: “Almost every major newspaper, magazine, and website now has a
way for leakers to upload secret information, most through an anonymous, online, open-sourced drop box called Secure Drop
. . . The New York Times, The Washington Post, The New Yorker, Forbes, and The Intercept, to name just a few, all have a way
for people to pass secrets along to journalists.”
20. Keith Hampton, Lauren Sessions Goulet, Cameron Marlow, and Lee Rainie, “Why Most Facebook Users Get More Than They
Give”, PEW Internet and American Life Project, 3 February 2012, at http://www.pewinternet.org/2012/02/03/why-most-face-
book-users-get-more-than-they-give; Sherry Turkle, Alone Together: Why We Expect More from Technology and Less from Each
Other (Basic Books, 2011).
21. Positive Internet Values: In an article in The Wall Street Journal titled “The Dark Side of the Digital Revolution” (19 April
2013), Google’s executive chairman and former CEO Eric Schmidt and Google Ideas Director Jared Cohen described trying to
explain the nature of the Internet to North Koreans during a visit to their country. They wrote: “We ended up trying to describe
the Internet to North Koreans we met in terms of its values: free expression, freedom of assembly, critical thinking, and meritoc-
racy.” These values are evident in the secure digital commons shared by the Intelligence Community but absent the blight that
anonymous negative actors bring to the World Wide Web.
22. Big Data: “Big data” is the term currently in common usage to refer to extremely large data sets that can be analyzed computa-
tionally to reveal patterns, trends, and associations, often relating to human behavior and interactions. While “big data” specif-
ically refers to the data itself, the term is also used colloquially to allude to the many uses to which such data can be applied,
such as profiling, tracking, predicting, and identifying individuals, and trends or patterns in both individual and group behavior.
For an accessible, balanced book-length view of the benefits, limits, and downsides to society and to corporations of computing
technology applied to data, see Viktor Mayer-Schönberger and Kenneth Cukier, Big Data (First Mariner, 2014). For easy-to-
read skeptical views, see: Tim Harford, “Big Data: Are We Making a Big Mistake?” Financial Times, 28 March 2014 at: https://
www.ft.com/content/21a6e7d8-b479-11e3-a09a-00144feabdc0?mhq5j=e1 and “The Economist Explains: The Backlash Against
Big Data” in The Economist, 21 April 2014, at https://www.economist.com/blogs/economist-explains/2014/04/economist-ex-
plains-10. At present, large-scale data analytics—their powers and capacities and their positive and negative effects on people
and culture—are still very much in flux and subject to widespread opinion and debate.
23. Psycholinguistics: Corporations use big data to engage in so-called “sentiment analysis” to evaluate, based on data available on
the Internet, the emotions around their brands. Sentiment analysis means computationally identifying and categorizing opinions
expressed in pieces of text, and also now in voice communications, in order to determine whether writers’ or speakers’ attitudes
toward a particular topic, product, or corporation (or brand) trend toward the positive, negative, or neutral. For a discussion of
psycholinguistics (or forensic linguistics), including the history of their development and use, validity, reliability, and the stakes
to individuals if computational tools applied to linguistics get it wrong in forensic contexts, see Jack Hitt, “Words on trial: Can
linguistics solve crimes that stump the police?” in The New Yorker, 23 July 2012.
24. Readings on Organizational Risks of Surveillance: See for example: Harvard Business Review Staff, “With Big Data Comes
Big Responsibility,” Harvard Business Review, November 2014; Neil M. Richards, “The Dangers of Surveillance,” Harvard
Business Review 126, 20 May 20 2013; Kirstie Ball, “Workplace Surveillance: An Overview,” Labor History 51, 1 April 2010;
Watson N. Nathan, “The Private Workplace and the Proposed ‘Notice of Electronic Monitoring Act’: Is ‘Notice’ Enough?”
Federal Communication Law Journal 54(1) (2001): 79–104, retrieved at http://www.repository.law.indiana.edu/cgi/viewcontent.
cgi?article=1288&context=fclj; Graham Sewell and James R. Barker “Neither Good, Nor Bad, but Dangerous: Surveillance as
an Ethical Paradox,” Ethics and Information Technology 3 (3) (2001): 183–96.
25. Readings on Employee Attitudes Toward Surveillance: Those interested in individual differences in employee attitudes toward
and tolerance of workplace surveillance are directed to: G. Stoney Alder, Marshall Schminke, Terry W. Noel, and Maribeth
Kuenzi, “Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation,” Journal of Business Ethics
80 (2007): 481–98; the American Management Association/ePolicy Institute. Electronic Monitoring Surveillance Survey (2007);
Bernd Carsten Stahl, Mary Prior, Sara Wilford, Dervla Collins, “Electronic Monitoring in the Workplace: If People Don’t Care,
Then What is the Relevance?” in John Weckert (ed.), Electronic Monitoring in the Workplace: Controversies and Solutions (Idea
Group Publishing, 2005). This last reference explores not only how employees or other subjects react to being surveilled (they
do not necessarily see it as problematic, within certain limits) but also how custodians and policy-creators of the surveillance
methods react to their roles and the ethical dimensions of their functions. These researchers acknowledge real limitations to their
empirical methods (small sample sizes and lack of generalizability) but their findings are still thought-provoking, given that they
counter the general, decades-long consensus of scholars in multiple fields that people do not like being surveilled, even if they
are willing to tolerate it in some circumstances and contexts.
26. Readings on Risks to Individuals of Surveillance: For a good academic book-length treatment of the range of issues involved
in workplace surveillance, see John Weckert (ed.), Electronic Monitoring in the Workplace: Controversies and Solutions (Idea
Group Publishing, 2005) (one article in this book is cited immediately above). Core arguments for and against employee
monitoring are examined in Kirsten Martin and R. Edward Freeman, “Some Problems with Employee Monitoring,” Journal of
Business Ethics 43 (2003): 353–61. For an article-length contemporary and a book-length classic exploration of the negative
subjective experience of surveillance, see Michael P. Lynch, “Privacy and the Threat to the Self,” New York Times, 22 June 2013,
retrieved at https://opinionator.blogs.nytimes.com/2013/06/22/privacy-and-the-threat-to-the-self/; Sissela Bok, Secrets: On the
Ethics of Concealment and Revelation (Pantheon Books, 1983).
27. The importance of context to acceptance of electronic monitoring is explored in: Lamar Pierce, Daniel C. Snow, Andrew McA-
fee, “Cleaning House: The Impact of Information Technology Monitoring on Employee Theft and Productivity,” MIT Sloan
Research Paper No. 5029-13, October 2014, retrieved at: http://www.hbs.edu/faculty/Pages/item.aspx?num=51564.
28. Jessica Stern and Ronald Shouten, “Lessons from the anthrax letters” in Matthew Bunn and Scott D. Sagan (eds.), Insider
Threat (Cornell University Press, 2016), 93–94.
29. George Orwell, 1984 (Harcourt, Brace & Co., 1949).
30. Assessing the Mind of the Malicious Insider: Using a Behavioral Model and Data Analytics to Improve Continuous Evaluation
(http://www.insaonline.org/i/d/a/b/MindofInsider_wp.aspx. See also INSA, Leveraging Emerging Technologies in the Security
Clearance Process, March 2014
31. Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, and Peter Swire, Liberty and Security in a Chang-
ing World: Report and Recommendations of the President’s Review Group on Intelligence and Communications Technologies,”
December 12, 2013. Available at https://obamawhitehouse.archives.gov/blog/2013/12/18/liberty-and-security-changing-world.
32. United Kingdom House of Lords, Select Committee on the Constitution, 2nd Report of Session 2008–09, Surveillance: Citizens
and the State, 27. Available at https://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/18.pdf.
33. Emrys Westacott, “Does Surveillance Make Us Morally Better?” in Philosophy Now 79 (June/July, 2010). Available at https://
philosophynow.org/search?q=westacott+surveillance.
v v v
v v v
People who commit espionage sustain double lives. When a person passes
classified information to an enemy, he or she initiates a clandestine second
identity. From that time on, a separation must be maintained between the
person’s secret “spy” identity, with its clandestine activities, and the “non-spy”
public self. The covert activities inescapably exert a powerful influence on the
person’s overt life. They necessitate ongoing efforts at concealment, compart-
mentation, and deception of those not witting of the espionage, which includes
almost everyone in the spy’s life. For some people, sustaining such a double
identity is exciting and desirable; for others, it is draining and stressful. For a
a. “Why I Spied: Aldrich Ames,” New York Times interview with Tim Weiner, 31 July 1994.
A career CIA case officer, Ames was arrested in 1994 for spying over a nine-year period for
the KGB and its successor, the Ministry of Security for the Russian Federation. Ames made
a calculated decision to give the Russians the names of US penetrations in Russia who were
in position to alert their American handlers—and therefore the FBI—that there was a mole
in the CIA. All but one were executed. Weiner wrote, “He sold a Soviet Embassy official
the names of two KGB officers secretly working for the FBI in Washington. The price:
$50,000. The next month, he volunteered the names of every Soviet intelligence official
and military officer he knew was working in the United States, along with whatever else he
knew about CIA operations in Moscow . . . he received a wedding present from the KGB:
$2 million.” Ames is serving a life sentence without parole.
The views, opinions, and findings expressed in this article are those of the author
and should not be construed as asserting or implying US government endorsement
of its factual statements and interpretations or representing the official positions of
any component of the United States government.
Scope Note
A classified version of this article was published in Studies in Intelligence in December 2003. The concepts discussed in the
2003 article are unchanged in this revision, but the case study information contained in textboxes in the original article have
been updated with unclassified or declassified material made available since 2003. This revision is intended to supplement
the author’s re-examination, 14 years later, of the psychological drivers of espionage and of intentional leaking of intelli-
gence data. The latter is an issue the original article and this, now unclassified, article do not address because such leaking
was not then the prominent problem it now is. The new article, “Why Spy? Why Leak?” begins on page 1.
Unless otherwise noted, quotations and information about the convicted spies used in this article are drawn from multiple
sources, including law enforcement investigative documents, counterintelligence reports, court documents, and publicly
available media accounts and books about US espionage and intelligence.
Alert readers will point out that experts in espionage only have arrested spies to study and that there may be some who
have “gotten away with it.” These spies would by definition not be included in our study sample, and therefore our model
only describes those who get caught. Ironically, many caught spies eventually tell investigators they were certain they had
the skills to avoid capture, unlike their less skilled counterparts. Nicholson, for example, said this about his fellow case
officer Ames, whose arrest prompted Nicholson to start his own espionage and “do better” at not getting caught. FBI special
agent Hanseen served in counterintelligence and was convinced he could outperform the spies he was tasked to study and
catch.
It is extremely difficult to predict complex, relatively rare human behavior such as espionage because of the problem of
false positives: many people demonstrate the common warning signs that can lead to the the decision to spy but most
will never engage in espionage. It is equally difficult for an organization to detect, measure, and therefore account for the
reasons behind good-news “success” stories, for example, when a budding insider threat is recognized early and effectively
addressed before causing great harm.
The small number of arrested spies means there is insufficient statistical power to conduct meaningful empirical analyses to
predict who in an organization will become a spy. For example, the press dubbed 1985 the “Year of the Spy” because of a
string of high-profile cases: eight Intelligence Community insiders were arrested that year on charges of espionage. In fact,
the previous year the FBI had apprehended a much larger number: 12.b Even in these two consecutive “banner years” for
espionage arrests, the total number of spies (20 individuals) was vanishingly small compared to the millions in the US gov-
ernment with top secret accesses who did not commit espionage. The low base rate for espionage cases has not changed
since the mid-80s. The 2015 Annual Report of Security Clearances Determinations by the Office of the Director of National
Intelligence reports that 1,220,678 top secret security clearances were active in 2015, and arrests for espionage in 2015
were in no way comparable to the “high” of 20 cases in 1984 and 1985.
In sum, as a result of these limitations, the Intelligence Community turns to in-depth psychological assessments to better
understand the psychology of espionage.c The long-term consensus among Community counterintelligence professionals
(psychologists, law enforcement and investigative professionals, and analysts) is that the key individual variables motivating
espionage described in this article—personality, crisis, and opportunity—are supported through the accumulation of case
studies of arrested spies since formal psychological and investigative studies began during and after WWII.
a. A good example of a study that addresses the relationship of organizational processes to an insider crime is Amy B. Zegart’s case
study of the Army psychiatrist, Maj. Nidal Malik Hasan, who killed 14 soldiers and wounded 43 in a military deployment center at Ft.
Hood, TX. See “The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies” in Matthew Bunn and
Scott D. Sagan (eds.), Insider Threats (Cornell University Press, 2017), 42–74. The book contains numerous other useful case studies.
b. https://www.fbi.gov/history/famous-cases/year-of-the-spy-1985.
c. Alexander L. George and Andrew Bennet, Case Studies and Theory Development in the Social Sciences, 4th ed. (MIT Press, 2005).
Walker recruited his friend Jerry Whitworth, a Naval communications specialist who, like Walker, had a “top secret crypto”
clearance. Walker and Whitworth agreed to a “50/50 split” of the proceeds, with Walker functioning as the middleman. After
retirement. Walker also recruited his brother, Arthur, a retired Navy lieutenant commander, who was working for a defense
contractor. He also signed up his 20-year-old son, Michael, who had enlisted in the Navy. Walker used greed to induce his
brother and son to spy, though during post-arrest debriefings Michael said his primary motive had been a desire to be like
his father.
Walker’s daughter enlisted in the Army in 1978. He offered her “a great deal of money” if she would seek a position in Army
communications, giving her $100 and promising that this was only the beginning should she cooperate. She steadfastly re-
fused, but he continued to contact her periodically to ask if she had given it further thought. After his daughter left the Army,
Walker appeared at her residence accompanied by Whitworth and Whitworth’s wife and again tried to recruit her, telling her
that his “man in Europe” was willing to provide her with special equipment to spy but was worried that she was getting “too
old” to reenlist. She rebuffed him again, but Walker later sent her $500, characterizing the money as an advance from his
“man in Europe.”
Walker and his subagents were arrested in 1985 after his ex-wife called the FBI after he had stopped support payments to
her. She was stunned when her tip-off also resulted in the arrest of her son and said afterward that she would never have
called the FBI had she known that Walker had recruited their son. Walker’s daughter called the FBI separately in an attempt
to regain custody of her only child, which she had surrendered during divorce proceedings from her husband, who had
threatened to reveal her father’s espionage to the FBI if she fought for custody.
During the debriefings after his arrest, Walker characterized his spying as an exciting game and adventure that was also
“quite profitable.” Asked if, in hindsight, he would have done things differently, he joked that he should have killed his
alcoholic ex-wife, and he maintained that he was caught only because he lost his capacity to pay for “the drunk’s” silence.
Walker’s exploitative and callous attitude and inability to appreciate his role in damaging the lives of others are characteris-
tic of psychopaths.
Walker died in prison in August 2014. His son was paroled in 2000 after serving 15 years of a 25 year sentence.
weak—such as those with inadequate and lifestyle support for troubled Narcissism
personnel measurement and tracking employees. These unique institution- I have had much opportunity
systems or with vulnerable informa- al controls are essential because the to reflect on what happened .
tion systems— will be particularly Intelligence Community’s compart- . . Greed did not motivate me.
unprotected against psychopathic mentation of information, secrecy It never did. If it had, I would
manipulations. regarding programs and activities, have taken the actions I did far
and constant mobility of personnel sooner. There were many chanc-
The Intelligence Community has make it relatively easy for unscrupu- es to pursue greed through sus-
both more protection from and more lous employees to maneuver unde- tained contacts with Russians
vulnerability to deliberate manipu- tected and to manipulate the system. and others in [various locations]
lation by insiders. The institutional In the national security environment, . . . but I didn’t. This is not
safeguards are greater than in most such behaviors have the potential to meant to be an excuse, just a
workplaces because of rigorous med- do especially grave harm. reflection. Patriotism, Loyalty,
ical and security screenings of appli- Honor—all these had once been
cants, regular security reviews of the of paramount importance to me.
workforce, and programs for medical They all took a back seat when
—CIA spy Jim Nicholsona Narcissistic personalities are char- control. Convinced of their own in-
acterized by exaggerated self-love herent superiority, they blame others
Yes, and there were Kapos, too, and self-centeredness. Alongside an for their problems or for negative
during the concentration camps. all-encompassing grandiosity runs a things that happen to them, including
subtle but equally pervasive insecuri- social rejection. Because they do not
—Navy civilian analyst Jay
ty, into which narcissists have limited consider themselves at fault for any
Pollardb
insight. Their internal world typically troubles or setbacks, narcissists feel
is built around fantasies about their at liberty to take whatever steps they
remarkable personal abilities, charis- deem necessary to redress wrongs
a. Harold James Nicholson, in a letter ma, beauty, and prospects. They are or regain a sense of mastery and
written from prison addressed to a senior compelled to exhibit their presumed superiority.
Intelligence Community official. A career
CIA case officer, Nicholson was arrested
stellar attributes and constantly seek
affirmation from others. Though their Narcissistic self-absorption should
in 1996 for spying for the Russians, to
whom he had volunteered in 1994 when imaginings distort common sense or not be confused with an inability to
he was completing a tour of duty as the everyday reality, narcissists never- grasp the perspective of others. Their
second-in-command of a post in Asia. In theless believe in the accuracy of hunger for affirmation produces acute
addition to passing a wide range of intelli- their daydreams and act accordingly. awareness of the reactions they are
gence documents, Nicholson compromised provoking from the people around
the identities of numerous CIA colleagues
Others, therefore, often experience
them as lacking common sense and them. This deep hunger for affirma-
working under cover, including the identi-
ties of many newly hired students destined twisting reality. When facts or other tion also makes them vulnerable to
for their first posts. (He had been one of people contradict or interfere with manipulation, particularly by people
their trainers as a senior faculty member their fantasies, narcissists become whose admiration or approval they
at a CIA training center.) He pleaded combative and vengeful. Their de- desire. Narcissists are particularly
guilty and was sentenced to 23 years and sensitive to authorities or to other-
7 months imprisonment. While serving
fensive hostility to criticism— even
mild feedback—is often well out of wise socially prominent or powerful
his sentence, he induced his youngest son,
Nathan, then 22, to contact and collect over proportion to whatever provocation people. Conversely, they can be inor-
$47,000 from Russian officials, which the sparked it. dinately indifferent to or contemptu-
elder Nicholson called a “pension.” FBI ous of the feelings or needs of people
agents were tracking Nathan and arrested Narcissists possess a careless dis- whom they believe to be insignificant
him in 2008; his father then pleaded guilty regard for personal integrity and can or social inferiors.
to charges of conspiracy to act as an agent be very unscrupulous and manipula-
of a foreign government and conspiracy Narcissists in the Workplace
to commit money laundering. Eight years
tive in pursuing their own ends. They
are, on the whole, indifferent to the Narcissists are often magnetic
were added to his sentence, which he
is now serving in a federal “supermax” needs of others, who in turn see them because their supreme self-confi-
penitentiary. His son cooperated with the as having flawed social consciences. dence wedded to their urgent drive
investigation and was sentenced to five Narcissists feel entitled to special— to impress enables them to project
years probation (see “Twice Convicted even extraordinary— favors and the appearance of talent and charm
ex-CIA spy gets 8 more years,” USA Today, effectively. Over time, the charisma
18 January 2011).
status that they do not believe they
have to reciprocate. They heedlessly wears thin as it becomes evident
b. This comment reflects Pollard’s in- that this appearance is not built on
exploit others emotionally and finan-
dictment of Jewish-American officials,
cially, or in other ways that suit their substance, but rather on fantasies and
including a federal judge, involved in his
prosecution, trial, and life sentence for ends. They are deeply antagonistic to fabrications. Furthermore, narcissists’
spying for Israel. In “60 Minutes: The sharing decisionmaking with others, pervasive tendency to see others as
Pollards,” an interview with Mike Wallace, irrespective of the legitimacy of the inferior causes them to be needlessly
CBS, 20 November 1988. (See case study claims of others for some degree of sarcastic, belittling, or supercilious.
on page 26.)
Pollard’s pre-espionage history showed a pattern of self-aggrandizement and lapses in judgment. As an undergraduate at
Stanford University, he bragged to fellow students that he was a Mossad agent, claiming that Israel was paying his tuition
and that he had fought and been wounded in the 1973 Yom Kippur War. In one memorable episode, he brandished a pistol
in front of startled fellow students, loudly proclaiming that he needed to carry it for protection because of his intelligence
activities. A former college roommate described Pollard as having a penchant for “dirty jokes” and being so immersed in
fantasy war games on campus that he was nicknamed “Colonel” (of the Mossad).a
Pollard’s conduct and attitude problems continued after he secured an analytic job with the Navy. One Monday, he arrived
disheveled and unshaven for an interview for a new position, claiming that the Irish Republican Army had kidnapped his
then-fiancée and he had spent the weekend securing her release. This incident went unreported, although he did not get
the job.b In a 1980 effort to join the Navy’s HUMINT intelligence element, Pollard made fictitious claims to have completed
an M.A., to be proficient in Afrikaans, and to have applied for a commission in the naval reserve. Even more far-fetched, he
told his immediate supervisor that he had valuable South African contacts because his father had been a CIA chief of station
in South Africa. (Pollard’s father was a microbiologist on the faculty of Notre Dame University.) Based on these fabrications.
Pollard secured the assignment. Once on the job, his falsehoods became apparent and his erratic behavior raised further
alarms. He showed up at meetings against orders, claiming he was entitled to attend, and he disclosed classified informa-
tion without authorization to a South African defense attaché, perhaps in an attempt to sustain his lies about his valuable
liaison contacts.
In a letter from jail in 1989 designed to raise political support for an Israeli-fostered campaign to gain his release from his
life sentence, Pollard wrote, “I do not believe that the Draconian sentence meted out to me was in any way commensurate
with the crime I committed. As I have tried to point out on innumerable occasions, I was neither accused of nor charged with
having intended to harm this country, as I could have been under the provisions of the espionage statute. In other words,
I did not spy ‘against’ the United States. Nowhere in my indictment . . . was I ever described as a ‘traitor,’ which is hardly
a surprise given the fact that the operation with which I was associated actually served to strengthen America’s long-term
security interests in the Middle East.” Pollard’s lack of insight into his failures in judgment and ethics and his recasting of
events to conform to his grandiose fantasies and self-image are consistent with narcissistic personalities.c
a. Wolf Blitzer, Territory of Lies: The Rise, Fall and Betrayal of Jonathan Jay Pollard (Harper Paperbacks, 1990), 36.
b. Seymour M. Hersh, “The Traitor,” New Yorker, 18 January 1999: 27.
c. In a 15 May 1998 interview with the Associated Press, Pollard expressed regret. “There is nothing good that came as a result of
my actions,” he conceded “I tried to serve two countries at the same time. . . . That does not work. . . . People could identify with my
predicament . . . because they knew they could be in my place through love of state. . . . There can be no justification for violating the
trust given an intelligence officer. I made a mistake.” In November 2015 Pollard was released on parole after serving 30 years of his life
sentence.
People around narcissists may the recipients of antagonistic feelings the interpersonal conflicts they habit-
note stark contrasts in their conduct at distinct odds with their view of ually generate.
toward different classes of people, themselves as infinitely superior and
depending on their social rank and admirable. They have limited insight In addition, narcissists often show
usefulness. Furthermore, the hostile into their role in these dynamics and a pattern of violating organizational
and vindictive attacks narcissists tend to blame others for their own rules and disregarding institutional or
mete out when others challenge their lack of social success, in the work- managerial authority. They trivialize
grandiosity tend to provoke angry place as elsewhere. Their managers inconvenient regulations or hold
responses in return. The result is that will frequently have to intervene in themselves superior and exempt from
narcissists frequently find themselves policies, directives, and laws. They
Kampiles had joined the CIA in 1977 at age 22. He was offered a watch officer position when his application for Directorate
of Operations (DO) case officer training was rejected. He arrived at work with distorted notions of his abilities and prospects
and quickly became disgruntled. Uninterested and contemptuous of his assigned duties, he clashed with his supervisor, and
his persistent efforts to transfer to the DO led to a formal notice that he was required to serve in his present position for two
years, which only deepened his disgruntlement.
Through personal contacts, Kampiles managed to secure an interview with the DO Career Training Staff. His interviewer de-
scribed him as immature and lacking self-discipline and judgment. Highlights of their discussion include Kampiles revealing
that he had only accepted the watch officer position as a way to secure entry into the DO and that he would resign from the
CIA if he were not accepted. He attributed his difficulties in the Operations Center to his reputation as a playboy, and when
his interviewer asked if this reputation was deserved, he boasted of his successes with women. Questioned about what he
had liked best about a past menial job, he quipped that it was the expense account.
Kampiles smuggled a KH-11 manual out of the Operations Center to try to get his CIA supervisor in trouble when it was
found to be missing. He also vaguely envisaged that he could turn around his upcoming termination by using the document
to initiate a free-lance, James Bond-style operation, thus persuading the CIA that he was indeed case officer material and
could be deployed as a double agent against Moscow. Four months after his resignation, he volunteered the document to
the Soviets in Athens, Greece, where he was visiting relatives. Upon his return to the United States, he got in touch with
a former CIA colleague and revealed his contact with the Soviets. The colleague asked him to describe his activities in a
letter. Kampiles wrote about his “accidental” meeting with a Soviet in Athens and noted that other meetings followed, but
he did not directly admit to passing documents. “What I have talked about thus far has been generalized,” he explained. “I
did this because to be entirely specific it would take the length of a short book to narrate this entire story. If you think there
might be agency [i.e., CIA] interest, I might be willing to discuss this experience in full detail.”
The letter led to an FBI investigation and Kampiles’s arrest for espionage, for which he was sentenced to 40 years in prison.
Reflecting on his motives and state of mind at the time that he took the KH-11 manual and later when he passed it to the
Soviets, Kampiles told his FBI interrogators, “I think you know, boiling it down, I think it was monetary and the glamour and
the excitement, that this sort of thing might bring on . . . the danger . . . the intrigue, all that together.” Kampiles’s immersion
in a fantasy world, his belief that both reality and other people would play along, the profound failures in perception and
judgment caused by his fantasies, and his initial shock upon his arrest and eventual remorse at the harm he caused are all
consistent with immaturity.
content and degree. Psychopaths oped, such individuals are less tied anticipation of consequences that to
tend to fantasize mostly about power, to factual reality than their mature most people would be completely
pain, and control, while narcissists peers and more dependent on fantasy predictable. They are often genuinely
focus on their personal superiority to cope with events and to maintain shocked when reality intrudes on
and the hostility provoked by those stability. their plans and interferes with antici-
who do not notice it and their plans pated outcomes.
to get revenge for perceived slights Consequently, immature adults
and insults. The fantasy lives of generally expect others to embrace Furthermore, immature people
immature persons are frequently what to them is the self-evident are persistently egocentric, they see
much less well defined; they can be legitimacy of their personal ideas and themselves as the epicenter of any
likened to the dreamlike blend of longings. They often cannot under- crowd or event. They believe others
perceptions, thoughts, imagination, stand why others do not share their are paying close attention to them
and facts characteristic of psycholog- perspective and fail to see that reality personally in most contexts, and as
ically healthy children. Because the itself works against the validity of a result they are acutely self-aware.
reasoning, judgment, and self-control their fantasies. They frequently will When it becomes clear that they are
of immature adults are underdevel- act on their fantasies with little not the center of attention and that
After his arrest, Hanssen reported that as a junior special agent working in the FBI’s New York office, he was inspired to
commit espionage by reading operational files of past and then current Russian agents. While fascinated by the clandes-
tine and secret world described in the files, he was also struck by what he estimated to be amateurish tradecraft and was
curious to see if he could do better. He initiated his espionage by leaving a letter signed with a code name for a Russian
case officer whose tradecraft he admired. In this, as in all communications with his handlers, Hanssen insisted on remaining
unidentified.
His anonymous letters to his handlers provide a window into his psyche. The tone varies from arrogant lecturing to pleading
for understanding and communication. He often addressed his handlers with a mixture of superciliousness and admonition,
as in the following excerpt from an 8 June 2000 letter in which he describes how they should view the United States: “The
US can be errantly [sic] likened to a powerfully built but retarded child, potentially dangerous, but young, immature, and
easily manipulated. But don’t be fooled by that appearance. It is also one which can turn ingenius [sic] quickly, like an idiot
savant, once convinced of a goal.”
Hanssen was motivated to spy by a mixture of greed, need for excitement, desire to test himself, and craving to feel like
a “hero” by becoming involved in something significant. To external appearances, there were many signs of stability in his
lifestyle. The Hanssen family was religiously devout with extensive ties in their faith community. Hanssen appeared to be a
responsible primary breadwinner. He was a moderately successful FBI special agent who, while not necessarily fitting the
typical mold, had secured a niche job that suited his talents. Despite these external signs of stability, however, Hanssen
possessed salient secret vulnerabilities. His desire to serve as a hero led him to initiate a mentoring relationship with a pros-
titute he imagined he could rescue from her lifestyle by showing her a better way to live. He abruptly cut off this relationship
when she proved unable to live up to his expectations. He installed a live-feed camera in his bedroom and surreptitiously
captured his sexual activity with his wife for a male friend, even discussing with this friend ahead of time what he would like
to watch. He also passed to him nude pictures of his wife and posted pornographic stories on the web featuring him and his
wife, all without her knowledge.
At work, Hanssen was considered odd and carried several pejorative nicknames. He was disciplined for angrily grabbing a
female colleague. He exploited a breach in the computer firewall to break into his supervisor’s computer, claiming he did it
to show FBI security the vulnerability of sensitive computer systems. When he was reprimanded as a young special agent
for throwing classified information in the trash rather than shredding it, he responded that he knew what was really classified
and what was not. The failures in empathy and in respect for others, the self-absorption, and the poor judgment evident in
these behaviors suggest a mixed personality disorder.
Mixed Personality Disorder What may be most notable in such ality contains a mix of psychopathic,
I feel I had a small role in cases is a lack of positive personality narcissistic, and dependent features.
bringing down the USSR. . . . I features to counterbalance negative
wanted to be able to contribute ones. In addition, some spies show a
in some way to that. . . . So I mix of characteristics from all three Healthy Personalities
launched my own war. dominant types. Some may also show
In healthy personalities, positive
other psychopathologies such as
—FBI mole Robert Hanssen characteristics counterbalance neg-
paranoid or compulsive symptoms.
ative ones. Positive features might
A case in point is former FBI Special
While the traits and behaviors include the ability to accept criticism;
Agent Robert Hanssen, who spied
of many spies match the features to feel remorse and make reparations
for the Russians over the course of
specific to psychopathy, narcissism, for mistakes; to show genuine empa-
21 years. A psychological evaluation
or immaturity and dependency, in thy for at least some people. Healthy
conducted as part of the damage as-
some cases the personalities do not personalities also exhibit reasonable
sessment concluded that his person-
readily fit any one of these types. stability of mood over time and
Carney’s initial motivation for his walk-in was a sense of betrayal by family, friends, and supervisors. His family background
was painful and unstable, including severe physical and emotional abuse and neglect and the frequent disappearance of
his father. Carney described himself as having been a lonely child, an “underdog” who felt inferior and had a burning desire
to prove his worth. He dropped out of high school to help support his mother financially, including paying for her divorce
from his father. When he visited home in 1983 on leave, he was shocked to find his father living there. After an acrimonious
visit, he returned to Germany, nursing feelings of bitterness and inadequacy. He was also coming to terms with his homo-
sexuality, which at the time put his military career at risk. In addition, Carney was deeply dissatisfied with the Air Force.
Despite salient intellectual gifts, he was unable to sustain an unblemished work record, had been decertified as a language
instructor, and had trouble regaining his credentials. He was outraged by his decertification, which he blamed on his super-
visors’ ill will, and felt humiliated and embarrassed.
On the night of his impulsive attempt to defect to East Germany, all of the acquaintances and friends he approached
rejected his overtures to go out. He went alone to some bars, had several drinks, and contemplated suicide. At one bar, he
happened to read an article about a Taiwanese pilot who defected to mainland China, was feted as a hero, honored with a
parade, and given money. “I’ll show them, I’ll show them all,” was Carney’s reaction. Acting on this thought, he took a cab to
Checkpoint Charlie, walked across, and presented himself to the East Germans as a defector. They quickly convinced him
to go back to his post at Marienfelde as a spy.
After his routine reassignment in 1984 to a domestic post, Carney became preoccupied with the announcement that all
employees with access to sensitive compartmented information (SCI) would be polygraphed. He was also furious with Air
Force doctors, who refused to operate on what he believed was a hernia. When he threatened to go to the inspector gen-
eral with his complaint, he was referred for a psychological evaluation and became concerned that drugs would be used
to make him say things beyond his control, exposing both his espionage and his homosexuality. He deserted and flew to
Mexico City, presenting himself unannounced to the East Germans. Upon his resettlement in East Berlin, the MfS tasked
him with transcribing intercepted conversations of US military and embassy personnel, from which he discerned their
responsibilities, attitudes, relationships, and personalities. If he felt that particular individuals were vulnerable, he wrote an
assessment describing their situation and suggesting the best recruitment approach. Carney claimed that the MfS appar-
ently prized his work.
After his arrest,a Carney readily confessed to his espionage and said that it helped him regain a sense of personal pride
and purpose. “Each time I took information out,” he asserted, “I felt like I was slapping my supervisors in the face.” He also
expressed bitterness that the US government had violated his German rights by forcibly taking him away from his home,
his personal belongings, and his common-law spouse. Carney’s impulsive decision to defect in a time of despair, along with
the psychological stability and sense of achievement and purpose that he temporarily gained once engaged in espionage,
demonstrate the role that stress and crisis can play in motivating a vulnerable person to seek a solution through espionage.
Carney was released in 2002 after serving 11 years of a 38-year sentence. He attempted to return to Germany, claiming
German citizenship, but he was denied entry because the East Germans had never granted him citizenship.
a. In his memoir Carney quotes himself as asking the OSI officers arresting him “What took you so long?” (Against All Enemies,
592); he also claims to have made several attempts during the arrest to assert rights as a German citizen but was told to shut up. FBI
Special Agent Robert Hanssen also contemptuously asked the FBI colleagues arresting him, “What took you so long?” Both Hanssen
and Carney demonstrated the reflexive grandiosity described in the personality section of this article in this sarcastic comment. When
he was arrested, Ames said, “You’re making a big mistake! You must have the wrong man!” demonstrating the automatic cunning and
slipperiness characteristic of psychopaths.
capacity to commit espionage for tap into this informal reservoir of such reviews can pinpoint problems
as long as possible. As a result, the observations to identify maladaptive they do not necessarily ameliorate or
relationship between an agent and a patterns that would put an intelli- fix them. Programs of education and
handler is frequently highly personal, gence organization at risk. support for the cleared workforce
intense, and emotional, at least from must supplement the safeguards
the perspective of the spy, and the While such medical and security provided by regular reviews. Edu-
nature of this relationship is often a screenings of applicants are the first cational programs regarding dan-
powerful force behind an individual’s line of defense, ongoing security ger signs can assist employees and
choice to spy. reviews of the employee population managers in spotting emotional or
are the second line, with the intent of behavioral problems in colleagues or
detecting personnel who demonstrate subordinates, or even occasionally in
Remedies and Risk patterns of troubling attitudes or themselves, before they evolve into
behaviors and intervening before seri- serious counterintelligence or security
Management ous misconduct occurs. The typology problems.
How people who have the poten- of psychological factors in espionage
tial to spy gain clearances and secure presented here has been helpful in Effective follow-through once
entry into the Intelligence Commu- organizing observations regarding the problems have been spotted is imper-
nity, how they progress and function personalities, behaviors, and life cir- ative in the form of active and well-
once inside, and how the risk they cumstances of captured spies, with an staffed medical support for troubled
pose might be mitigated are questions eye to developing countermeasures employees. It is especially important
of critical interest to security and and risk-mitigation strategies applica- to make such services available to
counterintelligence personnel as well ble to the workplace. employees who identify their own
as to medical and management pro- problems and come forward to seek
fessionals. The risk of spying can be Routine security and counterin- support voluntarily.
mitigated through programs designed telligence reviews of applicants and
to spot and address warning signs at staff should not be the only lines of Finally, case studies of apprehend-
each stage of an employee’s career defense, however, because while ed spies have demonstrated that some
and by providing support services to
troubled employees once they have The Anger of Edward Lee Howard
been identified or by disciplining Howard was dismissed from the CIA in 1983 after a polygraph exam indicated
them appropriately. he was involved in petty theft and drug use. In the months after his dismissal,
he moved to New Mexico with his wife, Mary. His alcohol abuse escalated, and
The entry points into an organi- he became increasingly angry at what he perceived to be the agency’s unfair
zation can be safeguarded through treatment. Howard claimed he provided information to the Russian KGB and
rigorous security and psychological eventually defected to Russia when he became aware of US surveillance of his
evaluations of applicants designed activities, while believing he was unfairly targetted and accused. A book about
Howard by David Wise and Howard’s own memoir, though filled with significant
to spot and weed out chronically
errors of fact, provide good examples of how a vulnerable person’s sense of
dysfunctional people unsuitable for disgruntlement and perceived ill-usage can provide the impetus to turn to es-
clearances. Patterns of personality pionage and the flawed, but compelling, justification for doing so.a Readers will
deficiencies that can result in trouble notice similar strands of acrimony and disgruntlement in the Carney, Pollard, and
both at work and in personal lives not Hanssen cases.
only attract the attention of trained
Howard’s death in Russia was reported on 22 July 2002. He supposedly broke
observers of human behavior—such his neck in a fall at his dacha, but the exact circumstances have never been
as psychologists and case officers— made public.
but also can be registered by more
incidental observers, such as cowork-
a. David Wise, The Spy Who Got Away: The Inside Story of the CIA Agent Who Betrayed
ers and neighbors. For this reason, His Country’s Secrets and Escaped to Moscow (Random House, 1988) and Edward Lee
background checks in the security Howard, Safe House: The Compelling Memoirs of the Only CIA Spy to Seek Asylum in
clearances process are designed to Russia (National Press Books, 1995).
began their espionage in a state of disgruntlement and, on a pragmatic has been violated. It would be con-
crisis marked by intense anger and level, making efforts to provide for soling if the capture of major spies in
frustration, and sometimes by finan- job placement programs and psy- recent years and the end of the Cold
cial desperation, after being fired or chological and financial counseling War signaled a downward trend in
in anticipation of termination. (See services to assist the person in estab- espionage. But the impetus to spy
textbox on Edward Lee Howard on lishing a stable lifestyle outside of grows out of the human psyche, and
preceding page.) the Intelligence Community. personality dysfunctions, personal
crises, and opportunities to serve oth-
Prudent risk mitigation in cases The Intelligence Community er masters will never vanish. Under-
of termination or forced resignation recoils every time a spy is caught. standing the elements of espionage
should include, when possible, safe- Laws have been broken, national is critical to remaining vigilant and
guarding the dignity of the person to security has been breached, and the safeguarding the vital mission of US
inhibit feelings of vengefulness and bond among patriotic professionals intelligence.
v v v